Avaya Configuring Integrated IP Security Manual do Utilizador Página 44

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 72
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 43
Configuring IP Security Services
3-8
304111-A Rev 00
The corresponding policy actions are:
•Drop
Bypass
Protect
Log (a message will be written to the router log)
The first three actions are mutually exclusive. You can specify a logging action for
any of the other three actions. Note that if an incoming packet that does not match
any configured policy arrives at an IPsec interface, it is dropped by default.
Policy Considerations
When you configure a WAN interface with IPsec, all inbound and outbound traffic
on that interface is processed by IPsec, including traffic being forwarded.
For unicast traffic containing routing or control information, consider configuring
policies that allow such traffic to bypass IPsec. For example, to allow ICMP traffic
(such as “ping” or “destination unreachable” messages) to bypass IPsec
processing, configure the first policy for the interface with the protocol criterion
set to number 1 (ICMP) and the action specification set to bypass.
If a data packet matches the criteria for more than one policy, the first matching
policy is used.
Vista de página 43
1 2 ... 39 40 41 42 43 44 45 46 47 48 49 ... 71 72

Comentários a estes Manuais

Sem comentários